Today ontology languages present a syntax which looks not “natural” and are lacking of built-in primitives (i.e., modeling notions) domain experts are familiar with. In this pa...
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
In this paper, we consider a contaminated network with an intruder. The task for the mobile agents is to decontaminate all hosts while preventing a recontamination and to do so as ...
This tutorial focuses on the task of automated information linking in text and multimedia sources. In any task where information is fused from different sources, this linking is ...
Database application programs are often designed to be executed concurrently by many clients. By grouping related database queries into transactions, DBMS systems can guarantee th...